{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:15Z","timestamp":1750221075833,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3230847","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Pyramidal-based Model to Compute the Impact of Cyber Security Events"],"prefix":"10.1145","author":[{"given":"Gustavo","family":"Gonzalez-Granadillo","sequence":"first","affiliation":[{"name":"Atos Research and Innovation, Barcelona, Spain"}]},{"given":"Jose","family":"Rubio-Hernan","sequence":"additional","affiliation":[{"name":"Institut Mines Telecom, Telecom SudParis, Evry, France"}]},{"given":"Joaquin","family":"Garcia-Alfaro","sequence":"additional","affiliation":[{"name":"Institut Mines Telecom, Telecom SudParis, Evry, France"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Deloitte Technical Paper, Last accessed","author":"Mossburg E.","year":"2018","unstructured":"E. Mossburg , J. Gelinne , H. Calzada , \" Beneath the surface of a cyberattack. A deeper look at business impacts \", Deloitte Technical Paper, Last accessed Feb. 2018 . E. Mossburg, J. Gelinne, H. Calzada, \"Beneath the surface of a cyberattack. A deeper look at business impacts\", Deloitte Technical Paper, Last accessed Feb. 2018."},{"key":"e_1_3_2_1_2_1","volume-title":"RTO Workshop Visualising Networks: Coping with Chance and Uncertainty","author":"Klein G.","year":"2010","unstructured":"G. Klein , C. Ruckert , M. Kleiber , M. Jahnke , J. Toelle , \" Towards a Model-Based Cyber Defense Situational Awareness Visualization Environment\" , RTO Workshop Visualising Networks: Coping with Chance and Uncertainty , 2010 . G. Klein, C. Ruckert, M. Kleiber, M. Jahnke, J. Toelle, \"Towards a Model-Based Cyber Defense Situational Awareness Visualization Environment\", RTO Workshop Visualising Networks: Coping with Chance and Uncertainty, 2010."},{"key":"e_1_3_2_1_3_1","volume-title":"Models and Architectures for Computer Networks Security Conference","author":"Kolomeec M.","year":"2017","unstructured":"M. Kolomeec , G. Gonzalez-Granadillo , E. Doynikova , A. Chechulin , I. Kotenko , H. Debar , \" Choosing Models for Security Metrics Visualization\", Mathematical Methods , Models and Architectures for Computer Networks Security Conference , 2017 . M. Kolomeec, G. Gonzalez-Granadillo, E. Doynikova, A. Chechulin, I. Kotenko, H. Debar, \"Choosing Models for Security Metrics Visualization\", Mathematical Methods, Models and Architectures for Computer Networks Security Conference, 2017."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0082"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13823-7_8"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.067"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37119-6_23"},{"key":"e_1_3_2_1_8_1","volume-title":"POMDPs make better hackers: Accounting for uncertainty in penetration testing. arXiv preprint arXiv:1307.8182","author":"Sarraute C.","year":"2013","unstructured":"C. Sarraute , O. Buffet , J. Hoffmann , POMDPs make better hackers: Accounting for uncertainty in penetration testing. arXiv preprint arXiv:1307.8182 , 2013 . C. Sarraute, O. Buffet, J. Hoffmann, POMDPs make better hackers: Accounting for uncertainty in penetration testing. arXiv preprint arXiv:1307.8182, 2013."},{"issue":"1","key":"e_1_3_2_1_9_1","first-page":"110","volume":"35","author":"Pasqualetti F.","year":"2015","unstructured":"F. Pasqualetti , F. Dorfler and F. Bullo , Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems in IEEE Control Systems , vol. 35 , no. 1 , pp. 110 -- 127 , Feb. 2015 . F. Pasqualetti, F. Dorfler and F. Bullo, Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems in IEEE Control Systems, vol. 35, no. 1, pp. 110--127, Feb. 2015.","journal-title":"Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems in IEEE Control Systems"},{"key":"e_1_3_2_1_10_1","volume-title":"ISSN","author":"Rubio-Hernan J.","year":"2017","unstructured":"J. Rubio-Hernan , L. De Cicco and J. Garcia-Alfaro , Adaptive Control-Theoretic Detection of Integrity Attacks against Cyber-Physical Industrial Systems. Transactions on Emerging Telecommunications Technologies , ISSN : 2161-3915, August 2017 . J. Rubio-Hernan, L. De Cicco and J. Garcia-Alfaro, Adaptive Control-Theoretic Detection of Integrity Attacks against Cyber-Physical Industrial Systems. Transactions on Emerging Telecommunications Technologies, ISSN: 2161-3915, August 2017."},{"key":"e_1_3_2_1_11_1","volume-title":"Module 12)","author":"Brown P.","year":"2011","unstructured":"P. Brown , M. Evans , D. Hunt , J. McIntosh , B. Pender , J. Ramagge , \"Cones, Pyramids and Spheres ( Measurement and Geometry : Module 12) \", Australian Mathematical Sciences Institute (AMSI) , 2011 . P. Brown, M. Evans, D. Hunt, J. McIntosh, B. Pender, J. Ramagge, \"Cones, Pyramids and Spheres (Measurement and Geometry: Module 12)\", Australian Mathematical Sciences Institute (AMSI), 2011."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0051-9"},{"key":"e_1_3_2_1_13_1","volume-title":"Risk Analysis and Security Countermeasure Selection","author":"Norman T. L.","year":"2010","unstructured":"T. L. Norman , Risk Analysis and Security Countermeasure Selection . CRC Press , Taylor & Francis Group, 2010 . T. L. Norman, Risk Analysis and Security Countermeasure Selection. CRC Press, Taylor & Francis Group, 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.02.004"},{"key":"e_1_3_2_1_15_1","volume-title":"Technical Paper","author":"Incident Response Forum","year":"2015","unstructured":"Forum of Incident Response and Security Teams , Common Vulnerability Scoring System v3.0 : Specification Document . Technical Paper , 2015 . Forum of Incident Response and Security Teams, Common Vulnerability Scoring System v3.0: Specification Document. Technical Paper, 2015."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.25"},{"key":"e_1_3_2_1_17_1","volume-title":"Scenes of the cybercrime, computer forensics handbook","author":"Shinder D.","year":"2002","unstructured":"D. Shinder , Scenes of the cybercrime, computer forensics handbook . Syngress Publishing Inc ., 2002 . D. Shinder, Scenes of the cybercrime, computer forensics handbook. Syngress Publishing Inc., 2002."},{"key":"e_1_3_2_1_18_1","unstructured":"Usenix \"On User Choice in Graphical Password Schemes\" available at:https:\/\/www.usenix.org\/legacy\/publications\/library\/proceedings\/sec04\/tech\/full_papers\/davis\/davis_html\/node8.html  Usenix \"On User Choice in Graphical Password Schemes\" available at:https:\/\/www.usenix.org\/legacy\/publications\/library\/proceedings\/sec04\/tech\/full_papers\/davis\/davis_html\/node8.html"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the International Symposium on Information Theory","author":"Massey J. L.","year":"1994","unstructured":"J. L. Massey , \" Guessing and entropy\" , In Proceedings of the International Symposium on Information Theory , 1994 . J. L. Massey, \"Guessing and entropy\", In Proceedings of the International Symposium on Information Theory, 1994."},{"key":"e_1_3_2_1_20_1","volume-title":"John Wiley and sons Inc","author":"Kern W. F.","year":"1934","unstructured":"W. F. Kern , J. R. Bland , \" Solid Mensuration\" , John Wiley and sons Inc ., London : Chapman and Hall , Limited, 1934 . W. F. Kern, J. R. Bland, \"Solid Mensuration\", John Wiley and sons Inc., London: Chapman and Hall, Limited, 1934."},{"key":"e_1_3_2_1_21_1","volume-title":"Cambridge University Press","author":"Wenninger M. J.","year":"1974","unstructured":"M. J. Wenninger , \" Polyhedron Models\" , Cambridge University Press , 1974 . M. J. Wenninger, \"Polyhedron Models\", Cambridge University Press, 1974."},{"key":"e_1_3_2_1_22_1","volume-title":"11th Conference on Risks and Security of Internet and Systems","author":"Gonzalez-Granadillo G.","year":"2016","unstructured":"G. Gonzalez-Granadillo , J. Garcia-Alfaro , and H. Debar , \" An n-sided polygonal model to calculate the impact of cyber security events \", 11th Conference on Risks and Security of Internet and Systems , 2016 . G. Gonzalez-Granadillo, J. Garcia-Alfaro, and H. Debar, \"An n-sided polygonal model to calculate the impact of cyber security events\", 11th Conference on Risks and Security of Internet and Systems, 2016."}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230847","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3230847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:31Z","timestamp":1750208251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230847"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":22,"alternative-id":["10.1145\/3230833.3230847","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3230847","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}